A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole. This can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics.
Workaround:
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:3607 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:3740 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-2842 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2355219 | issue tracking |